Movatterモバイル変換


[0]ホーム

URL:


US20080263197A1 - Passively attributing anonymous network events to their associated users - Google Patents

Passively attributing anonymous network events to their associated users
Download PDF

Info

Publication number
US20080263197A1
US20080263197A1US11/790,037US79003707AUS2008263197A1US 20080263197 A1US20080263197 A1US 20080263197A1US 79003707 AUS79003707 AUS 79003707AUS 2008263197 A1US2008263197 A1US 2008263197A1
Authority
US
United States
Prior art keywords
event
attribution
user
filtered
anonymous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/790,037
Other versions
US8996681B2 (en
Inventor
Gregory D. Stephens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitre Corp
Original Assignee
Mitre Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitre CorpfiledCriticalMitre Corp
Priority to US11/790,037priorityCriticalpatent/US8996681B2/en
Assigned to MITRE CORPORATION, THEreassignmentMITRE CORPORATION, THEASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: STEPHENS, GREGORY D.
Publication of US20080263197A1publicationCriticalpatent/US20080263197A1/en
Application grantedgrantedCritical
Publication of US8996681B2publicationCriticalpatent/US8996681B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems, methods, and computer program products for passively attributing anonymous network events to their associated users are provided herein. Embodiments include filtering network events over a pre-determined time interval to generate a filtered event list. In an embodiment, event attribution includes attributing an anonymous network event to a user associated with a nearest-neighbor event relative to the anonymous network event. In another embodiment, event attribution includes attributing an anonymous network event to a user associated with an event in the filtered event list, wherein that user maximizes an event attribution function. In a further embodiment, event attribution includes determining a first potential attribution user for an anonymous network event based on a nearest-neighbor attribution approach; determining a second potential attribution user for the anonymous network event based on an event attribution function approach; and comparing the first and second potential attribution users to determine the attribution of the anonymous event.

Description

Claims (25)

20. A method for passively attributing an anonymous network event to an associated user, comprising:
filtering network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list;
determining a first potential attribution user in said filtered event list, wherein said first potential attribution user is associated with a nearest-neighbor event relative to said anonymous event in said filtered event list;
determining a second potential attribution user in said filtered event list, wherein said second potential attribution user maximizes an event attribution function; and
attributing the anonymous network event to the first or second potential attribution user when said first and second potential attribution users are the same user.
25. A computer program product comprising a computer useable medium having computer program logic recorded thereon for enabling a processor to passively attribute an anonymous network event to an associated user, the computer program logic comprising:
filtering means for enabling a processor to filter network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list;
first determining means for enabling a processor to determine a first potential attribution user in said filtered event list, wherein said first potential attribution user is associated with a nearest-neighbor event relative to said anonymous event in said filtered event list;
second determining means for enabling a processor to determine a second potential attribution user in said filtered event list, wherein said second potential attribution user maximizes an event attribution function; and
attributing means for enabling a processor to attribute the anonymous network event to the first or second potential attribution user when said first and second potential attribution users are the same user.
US11/790,0372007-04-232007-04-23Passively attributing anonymous network events to their associated usersActive2032-12-17US8996681B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/790,037US8996681B2 (en)2007-04-232007-04-23Passively attributing anonymous network events to their associated users

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/790,037US8996681B2 (en)2007-04-232007-04-23Passively attributing anonymous network events to their associated users

Publications (2)

Publication NumberPublication Date
US20080263197A1true US20080263197A1 (en)2008-10-23
US8996681B2 US8996681B2 (en)2015-03-31

Family

ID=39873347

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US11/790,037Active2032-12-17US8996681B2 (en)2007-04-232007-04-23Passively attributing anonymous network events to their associated users

Country Status (1)

CountryLink
US (1)US8996681B2 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101848104A (en)*2010-03-172010-09-29深圳市易聆科信息技术有限公司Recording method and device for network management system and computer equipment
US20110314143A1 (en)*2010-06-222011-12-22Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
US8272055B2 (en)2008-10-082012-09-18Sourcefire, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US8289882B2 (en)2005-11-142012-10-16Sourcefire, Inc.Systems and methods for modifying network map attributes
US8433790B2 (en)2010-06-112013-04-30Sourcefire, Inc.System and method for assigning network blocks to sensors
US8474043B2 (en)2008-04-172013-06-25Sourcefire, Inc.Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
US8578002B1 (en)2003-05-122013-11-05Sourcefire, Inc.Systems and methods for determining characteristics of a network and enforcing policy
US8601034B2 (en)2011-03-112013-12-03Sourcefire, Inc.System and method for real time data awareness
US8677486B2 (en)2010-04-162014-03-18Sourcefire, Inc.System and method for near-real time network attack detection, and system and method for unified detection via detection routing
US20190260777A1 (en)*2018-02-202019-08-22Citrix Systems, Inc.Systems and methods for detecting and thwarting attacks on an it environment
US20210306355A1 (en)*2020-03-252021-09-30Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US20230224275A1 (en)*2022-01-122023-07-13Bank Of America CorporationPreemptive threat detection for an information system
US11973798B2 (en)2020-03-252024-04-30Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12131294B2 (en)2012-06-212024-10-29Open Text CorporationActivity stream based interaction
US12149623B2 (en)2018-02-232024-11-19Open Text Inc.Security privilege escalation exploit detection and mitigation
US12155680B2 (en)2021-03-172024-11-26Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12164466B2 (en)2010-03-292024-12-10Open Text Inc.Log file management
US12197383B2 (en)2015-06-302025-01-14Open Text CorporationMethod and system for using dynamic content types
US12235960B2 (en)2019-03-272025-02-25Open Text Inc.Behavioral threat detection definition and compilation
US12261822B2 (en)2014-06-222025-03-25Open Text Inc.Network threat prediction and blocking
US12282549B2 (en)2005-06-302025-04-22Open Text Inc.Methods and apparatus for malware threat research
US12412413B2 (en)2015-05-082025-09-09Open Text CorporationImage box filtering for optical character recognition
US12432243B2 (en)2020-03-252025-09-30Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12437068B2 (en)2015-05-122025-10-07Open Text Inc.Automatic threat detection of executable files based on static data analysis

Citations (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5627764A (en)*1991-10-041997-05-06Banyan Systems, Inc.Automatic electronic messaging system with feedback and work flow administration
US5983270A (en)*1997-03-111999-11-09Sequel Technology CorporationMethod and apparatus for managing internetwork and intranetwork activity
US6492944B1 (en)*1999-01-082002-12-10Trueposition, Inc.Internal calibration method for receiver system of a wireless location system
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6646604B2 (en)*1999-01-082003-11-11Trueposition, Inc.Automatic synchronous tuning of narrowband receivers of a wireless location system for voice/traffic channel tracking
US6813645B1 (en)*2000-05-242004-11-02Hewlett-Packard Development Company, L.P.System and method for determining a customer associated with a range of IP addresses by employing a configurable rule engine with IP address range matching
US20050044422A1 (en)*2002-11-072005-02-24Craig CantrellActive network defense system and method
US20050044406A1 (en)*2002-03-292005-02-24Michael StuteAdaptive behavioral intrusion detection systems and methods
US20050071465A1 (en)*2003-09-302005-03-31Microsoft CorporationImplicit links search enhancement system and method for search engines using implicit links generated by mining user access patterns
US6904387B2 (en)*2001-09-252005-06-07Siemens AktiengesellschaftHmi device and method for operating a technical facility, automation system having hmi device, and computer program product having program for carrying out the method in an hmi device or automation system
US6928471B2 (en)*2001-05-072005-08-09Quest Software, Inc.Method and apparatus for measurement, analysis, and optimization of content delivery
US20050188423A1 (en)*2004-02-242005-08-25Covelight Systems, Inc.Methods, systems and computer program products for monitoring user behavior for a server application
US20060020814A1 (en)*2004-07-202006-01-26Reflectent Software, Inc.End user risk management
US20060036720A1 (en)*2004-06-142006-02-16Faulk Robert L JrRate limiting of events
US7031310B2 (en)*2000-12-212006-04-18Fujitsu LimitedRouter and IP-packet-transferring method
US20060140182A1 (en)*2004-12-232006-06-29Michael SullivanSystems and methods for monitoring and controlling communication traffic
US7143439B2 (en)*2000-01-072006-11-28Security, Inc.Efficient evaluation of rules
US7143152B1 (en)*2000-03-312006-11-28Verizon Laboratories Inc.Graphical user interface and method for customer centric network management
US20060286993A1 (en)*2005-06-202006-12-21Motorola, Inc.Throttling server communications in a communication network
US20070050719A1 (en)*1999-05-072007-03-01Philip LuiSystem and method for dynamic assistance in software applications using behavior and host application models
US20070067780A1 (en)*2005-08-242007-03-22Samsung Electronics Co., Ltd.Method and system for asynchronous eventing over the internet
US20080126547A1 (en)*2001-09-122008-05-29VmwareResource allocation in computers
US20090119062A1 (en)*2007-11-012009-05-07Timetracking Buddy LlcTime Tracking Methods and Systems

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5627764A (en)*1991-10-041997-05-06Banyan Systems, Inc.Automatic electronic messaging system with feedback and work flow administration
US5983270A (en)*1997-03-111999-11-09Sequel Technology CorporationMethod and apparatus for managing internetwork and intranetwork activity
US6646604B2 (en)*1999-01-082003-11-11Trueposition, Inc.Automatic synchronous tuning of narrowband receivers of a wireless location system for voice/traffic channel tracking
US6492944B1 (en)*1999-01-082002-12-10Trueposition, Inc.Internal calibration method for receiver system of a wireless location system
US20070050719A1 (en)*1999-05-072007-03-01Philip LuiSystem and method for dynamic assistance in software applications using behavior and host application models
US7143439B2 (en)*2000-01-072006-11-28Security, Inc.Efficient evaluation of rules
US7143152B1 (en)*2000-03-312006-11-28Verizon Laboratories Inc.Graphical user interface and method for customer centric network management
US6813645B1 (en)*2000-05-242004-11-02Hewlett-Packard Development Company, L.P.System and method for determining a customer associated with a range of IP addresses by employing a configurable rule engine with IP address range matching
US7031310B2 (en)*2000-12-212006-04-18Fujitsu LimitedRouter and IP-packet-transferring method
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6928471B2 (en)*2001-05-072005-08-09Quest Software, Inc.Method and apparatus for measurement, analysis, and optimization of content delivery
US7539655B2 (en)*2001-05-072009-05-26Quest Software, Inc.Method and apparatus for measurement, analysis, and optimization of content delivery
US20080126547A1 (en)*2001-09-122008-05-29VmwareResource allocation in computers
US6904387B2 (en)*2001-09-252005-06-07Siemens AktiengesellschaftHmi device and method for operating a technical facility, automation system having hmi device, and computer program product having program for carrying out the method in an hmi device or automation system
US20050044406A1 (en)*2002-03-292005-02-24Michael StuteAdaptive behavioral intrusion detection systems and methods
US20050044422A1 (en)*2002-11-072005-02-24Craig CantrellActive network defense system and method
US20050071465A1 (en)*2003-09-302005-03-31Microsoft CorporationImplicit links search enhancement system and method for search engines using implicit links generated by mining user access patterns
US20050188423A1 (en)*2004-02-242005-08-25Covelight Systems, Inc.Methods, systems and computer program products for monitoring user behavior for a server application
US20060036720A1 (en)*2004-06-142006-02-16Faulk Robert L JrRate limiting of events
US20060020814A1 (en)*2004-07-202006-01-26Reflectent Software, Inc.End user risk management
US20060140182A1 (en)*2004-12-232006-06-29Michael SullivanSystems and methods for monitoring and controlling communication traffic
US20060286993A1 (en)*2005-06-202006-12-21Motorola, Inc.Throttling server communications in a communication network
US20070067780A1 (en)*2005-08-242007-03-22Samsung Electronics Co., Ltd.Method and system for asynchronous eventing over the internet
US20090119062A1 (en)*2007-11-012009-05-07Timetracking Buddy LlcTime Tracking Methods and Systems

Cited By (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8578002B1 (en)2003-05-122013-11-05Sourcefire, Inc.Systems and methods for determining characteristics of a network and enforcing policy
US12282549B2 (en)2005-06-302025-04-22Open Text Inc.Methods and apparatus for malware threat research
US8289882B2 (en)2005-11-142012-10-16Sourcefire, Inc.Systems and methods for modifying network map attributes
US8474043B2 (en)2008-04-172013-06-25Sourcefire, Inc.Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
US9450975B2 (en)2008-10-082016-09-20Cisco Technology, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US8272055B2 (en)2008-10-082012-09-18Sourcefire, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US9055094B2 (en)2008-10-082015-06-09Cisco Technology, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
CN101848104A (en)*2010-03-172010-09-29深圳市易聆科信息技术有限公司Recording method and device for network management system and computer equipment
US12210479B2 (en)2010-03-292025-01-28Open Text Inc.Log file management
US12164466B2 (en)2010-03-292024-12-10Open Text Inc.Log file management
US8677486B2 (en)2010-04-162014-03-18Sourcefire, Inc.System and method for near-real time network attack detection, and system and method for unified detection via detection routing
US8433790B2 (en)2010-06-112013-04-30Sourcefire, Inc.System and method for assigning network blocks to sensors
US9110905B2 (en)2010-06-112015-08-18Cisco Technology, Inc.System and method for assigning network blocks to sensors
US8671182B2 (en)*2010-06-222014-03-11Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
US20110314143A1 (en)*2010-06-222011-12-22Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
US9584535B2 (en)2011-03-112017-02-28Cisco Technology, Inc.System and method for real time data awareness
US8601034B2 (en)2011-03-112013-12-03Sourcefire, Inc.System and method for real time data awareness
US9135432B2 (en)2011-03-112015-09-15Cisco Technology, Inc.System and method for real time data awareness
US12131294B2 (en)2012-06-212024-10-29Open Text CorporationActivity stream based interaction
US12301539B2 (en)2014-06-222025-05-13Open Text Inc.Network threat prediction and blocking
US12261822B2 (en)2014-06-222025-03-25Open Text Inc.Network threat prediction and blocking
US12412413B2 (en)2015-05-082025-09-09Open Text CorporationImage box filtering for optical character recognition
US12437068B2 (en)2015-05-122025-10-07Open Text Inc.Automatic threat detection of executable files based on static data analysis
US12197383B2 (en)2015-06-302025-01-14Open Text CorporationMethod and system for using dynamic content types
US11277421B2 (en)*2018-02-202022-03-15Citrix Systems, Inc.Systems and methods for detecting and thwarting attacks on an IT environment
US20190260777A1 (en)*2018-02-202019-08-22Citrix Systems, Inc.Systems and methods for detecting and thwarting attacks on an it environment
US12149623B2 (en)2018-02-232024-11-19Open Text Inc.Security privilege escalation exploit detection and mitigation
US12235960B2 (en)2019-03-272025-02-25Open Text Inc.Behavioral threat detection definition and compilation
US11973798B2 (en)2020-03-252024-04-30Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12069067B2 (en)*2020-03-252024-08-20Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12432243B2 (en)2020-03-252025-09-30Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US20210306355A1 (en)*2020-03-252021-09-30Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12155680B2 (en)2021-03-172024-11-26Cleafy Società per AzioniMethods of monitoring and protecting access to online services
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system
US20230224275A1 (en)*2022-01-122023-07-13Bank Of America CorporationPreemptive threat detection for an information system

Also Published As

Publication numberPublication date
US8996681B2 (en)2015-03-31

Similar Documents

PublicationPublication DateTitle
US8996681B2 (en)Passively attributing anonymous network events to their associated users
US11805148B2 (en)Modifying incident response time periods based on incident volume
US10305922B2 (en)Detecting security threats in a local network
US9984241B2 (en)Method, apparatus, and system for data protection
US10735455B2 (en)System for anonymously detecting and blocking threats within a telecommunications network
KR101836016B1 (en)Context-aware network forensics
US10027562B2 (en)Detecting network services based on network flow data
US11770396B2 (en)Port scan detection using destination profiles
US20220217162A1 (en)Malicious port scan detection using port profiles
US11811587B1 (en)Generating incident response action flows using anonymized action implementation data
US8510446B1 (en)Dynamically populating an identity-correlation data store
US11126713B2 (en)Detecting directory reconnaissance in a directory service
CN113630396B (en)Method, device and system for processing network security alarm information
WO2022171380A1 (en)Anomaly detection

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MITRE CORPORATION, THE, VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:STEPHENS, GREGORY D.;REEL/FRAME:019291/0560

Effective date:20070419

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551)

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp